| Literature DB >> 35224445 |
Sampath Kumar Venkatachary1, Annamalai Alagappan2, Leo John Baptist Andrews3.
Abstract
Distributed generators (D.G.'s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements. With this also comes challenges associated with securing physical systems, data protection and information privacy. Recent technological advancements have aided cybercriminals to disrupt operations by carrying out deliberate attacks on the energy sector. Though security researchers have tried to mitigate the risks, vulnerabilities, and it remains a challenge. This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.Entities:
Keywords: Authentication and authorisation; Distributed energy resource (DER); Edge computing; IDS; Privacy; Security architecture; Virtual power plants (VPP)
Year: 2021 PMID: 35224445 PMCID: PMC8010494 DOI: 10.1186/s42162-021-00139-7
Source DB: PubMed Journal: Energy Inform ISSN: 2520-8942
Fig. 1VPP Energy System
Fig. 2Motivation trends for Attacks from 2019 to 2020
Fig. 3Sectors targeted from 2019 to 20
Cybersecurity incidents on Critical Infrastructure Services from 2019 to May 20
| Motivation by Sector | Jan-19 | Feb-19 | Mar-19 | Apr-19 | May-19 | Jun-19 | Jul-19 | Aug-19 | Sep-19 | Oct-19 | Nov-19 | Dec-19 | Jan-20 | Feb-20 | Mar-20 | Apr-20 | May-20 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cybercrime | 88.1 | 88.5 | 79.4 | 81.9 | 80 | 78.2 | 80 | 82.6 | 84.3 | 80.1 | 85.9 | 85.4 | 85.2 | 88.7 | 86.6 | 86.8 | 87 |
| Cyberespionage | 7.1 | 7.3 | 14.2 | 14.2 | 11.5 | 16.3 | 13 | 11.2 | 12.9 | 161 | 8.1 | 11.5 | 10.2 | 10.2 | 11.7 | 11.1 | 9.8 |
| Hacktivism | 0.8 | 2.4 | 2.1 | 1.3 | 2.3 | 0.7 | 1.6 | 2.5 | 0 | 2.6 | 3.7 | 0 | 1.89 | 0.5 | 0 | 0.5 | 2.7 |
| Cyber Warfare | 4 | 1.8 | 4.3 | 2.6 | 6.2 | 4.8 | 4.5 | 3.7 | 2.1 | 1.3 | 1.5 | 3.2 | 1.32 | 0.5 | 1.1 | 1.6 | 0.5 |
| Miscellaneous | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.57 | 0 | 0 | 0 | 0 |
| Unknown | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.7 | 0 | 0.7 | 0 | 0.19 | 0 | 0.6 | 0 | 0 |
| Critical Infrastructure Services | Jan-19 | Feb-19 | Mar-19 | Apr-19 | May-19 | Jun-19 | Jul-19 | Aug-19 | Sep-19 | Oct-19 | Nov-19 | Dec-19 | Jan-20 | Feb-20 | Mar-20 | Apr-20 | May-20 |
| Agriculture | 0.8 | 2.4 | 1.4 | 1.9 | 1.5 | 2 | 1.9 | 1.9 | 1.4 | 2.6 | 3.7 | 3.2 | 1.1 | 1.1 | 0.5 | 10.3 | |
| Information | 2.4 | 6.1 | 2.1 | 3.9 | 4.6 | 3.4 | 2.9 | 2.5 | 2.9 | 3.8 | 3 | 1.9 | 3.2 | 1.1 | 3.9 | 3.7 | 4.9 |
| Healthcare | 9.5 | 9.1 | 11.3 | 10.3 | 6.2 | 6.8 | 8.4 | 10 | 7.1 | 13.5 | 12.6 | 10.2 | 10.4 | 8.1 | 7.3 | 10.1 | 5.4 |
| Utilities | 0.7 | 0.6 | 0.6 | 0.5 | 2.2 | ||||||||||||
| Finance | 5.6 | 7.3 | 4.3 | 5.8 | 4.6 | 5.4 | 6.7 | 8.1 | 3.6 | 7.1 | 5.2 | 8.9 | 7.1 | 9.1 | 5.6 | 7.4 | 6.5 |
| Manufacturing | 1.6 | 0.6 | 3.5 | 3.9 | 0.8 | 0.7 | 1 | 1.3 | 5.7 | 2.6 | 4.4 | 3.8 | 6.5 | 3.2 | 4.5 | 1.6 | 3.3 |
| Public Sector (Multiple Industries) | 11.1 | 13.9 | 17.7 | 15.5 | 22.3 | 21.1 | 19 | 18.8 | 16.4 | 14.1 | 14.8 | 12.1 | 16.2 | 17.7 | 21.2 | 1.6 | |
| Defence | 7.9 | 8.5 | 12.8 | 12.9 | 13.1 | 12.2 | 12 | 13.1 | 10.7 | 12.2 | 8.1 | 15.9 | 16.2 | 14 | 11.2 | 6.9 | 10.3 |
| Transportation | 1.6 | 2.1 | 1.9 | 1.5 | 1.4 | 1.3 | 1.3 | 2.1 | 0.6 | 1.3 | 0.6 | 0.5 | 1.1 | 2.7 | |||
| Emergency Services (Other services activities) | 1.6 | 6.7 | 2.1 | 3.2 | 3.8 | 1.4 | 0.7 | 1.4 | 3.8 | 2.2 | 0.6 | 1.9 | 0.5 | 1.7 | 2.1 | 2.7 | |
| Energy | 0.8 | 0.6 | 1.9 | 0.8 | 1.4 | 2.9 | 4.4 | 0.7 | 1.9 | 2.2 | 0.6 | 3.9 | 2.7 | 1.1 | 2.1 | 2.2 |
Targeted Cybersecurity Attacks against Critical Services, Energy Sector etc.
| Year | Target Facility | Country | Agent | Impact | Ref |
|---|---|---|---|---|---|
| 1982 | Pipeline explosion | Russia | Malware (SCADA) | Explosion and fire. | (Zakhmatov et al., |
| 1992 | Ignalina Nuclear Power Station | Lithuania | Virus (Control System) | (Panda, | |
| 1992 | Chevron (Warning System) | USA | Virus | Hacking by a disgruntled employee who left thousands of employees exposed to toxicity | (Miller & Rowe, |
| 1994 | Salt River Project | USA | Malware (Control System) | Hacking by an employee, resulting in deleting of critical files resulting in disconnecting water supply to customers | (Panda, |
| 1997 | Worcester Airport | USA | Trojan (Control System) | Air traffic Control tower system down for six hours | (Panda, |
| 1999 | Gazprom | Russia | Trojan (SCADA) | No serious consequences | (Panda, |
| 2000 | Maroochy Water System | USA | Trojan | Water spillage | (Panda, |
| 2001 | Gas Processing Plant | USA | Unknown | Service outage in the vicinity | (Panda, |
| 2002 | PDVSA | Venezuela | Worm | Production outage | (Panda, |
| 2003 | Banking Facility; Ohio Nuclear Facility | Slammer aka Sapphire | Unknown | (McGuinn, | |
| Railways | SoBig | 23,000 miles of one railway line | (McGuinn, | ||
| 2004 | National Science Foundation’s Amundsen-Scott South Pole Station | Unknown | Controlling life support systems of Antarctic research station – Cyber Terror Attack | (Poulsen, | |
| 2006 | L.A. Traffic Lights | USA | Malware | Reprogram the lights | (Panda, |
| 2008 | Lodz Tram attack | Poland | Control of the tram network | (Panda, | |
| 2008 | Hatch Power Plant | USA | Malware | Unintentional shut down due to an update | (Desarnaud, |
| 2009 | Civil Aviation | Unknown | Data compromise; shutdown of systems | (Gorman, | |
| 2009, 2010 | Natanz - Iran’s Nuclear Plant (Centrifuges) | Iran and Many countries | StuxNet | Iran’s Nuclear centrifuges were targeted. The equipment was replaced at an alarming rate. | (Naraine, |
| 2011 | No Specific Target; Iran Nuclear Plants | Iran and Many countries | DuQu | Targeted; | (Boldizsár et al., |
| 2011 | Areva | France | Malware | Non-critical data theft | (Desarnaud, |
2012, 2015; 2016–17; 2018–19 | Saudi Aramco (UAE); RasGas (Qatar); Italy | UAE, Italy | Shamoom (alias) Disttrack; W32.Disttrack A; W32.Disttrack B; | 30–35,000 Machines; D-Dos attack; FileWiper or File Eraser | (Symantec Crop, |
| 2012, 2015 | Iran’s Nuclear Plant, Lebanon, Sriya, Sudan, etc | Flame aka Flamer, (StuxNet. Resource 207) | Approx. 1000 Machines, | (Boldizsar et al., | |
| 2013 | North American Energy Companies | Dragonfly | More than 1000 energy companies in North America and Europe | (BBC, | |
| 2014 | SCADA/ICS | Havex | Noticed in 146 Command and Control Server | (David, | |
| 2014 | Korea Hydro | South Korea | Malware | Reactor Manual theft; electricity and radiation exposure data | (Desarnaud, |
| 2015 | Ukrainian Kyivoblenergo | Black Energy 3 | 225,000 Customers left without power for 6 h on a cold December | (Lee, | |
| Polish Airlines | Unknown | 1400 passengers grounded | (Rene, | ||
| 2016 | Gundremmingen (German Nuclear Power Plant) | W32.RAMNIT; Conficker | Isolated Incident on the Power Plant as the plant was isolated. The previous version of Conficker A, B, C, D, E is reported to have caused damage to 1.7 million people. | (Symantec Corp, | |
| 2020 | Public Health Services | U.S.; | Ransomware | 200,000 email addresses compromised, leading to many health services being impacted with ransomware. Some restored to paying the ransom. | (Kochman, |
| 2020 | AZORult; Trojan | Spreads as payload and often is used by other payloads like Djvu; primarily collects user data | (Doffman, | ||
| 2020 | Citrix Application Delivery Controller | Australia, Canada, Denmark, India, Sweden, Singapore U.K., USA, Switzerland, UAE- | FTP protocol exploiting vulnerability CVE-2019-1971; Algorithm Command’ file/bin/Pwd | World Wide Citrix Gateway devices were impacted affecting banking, defence, healthcare, energy, technology, higher education, legal, media | (Glyer et al., |
| 2020 | Cisco Router Exploitation Kit – Cisco RV320 | Remote code execution; Metasploit Module is exploiting vul. CVE-2019-1653 CVE-2019-1652 |
Critical Services impacted between Jan-Jun 2020
| Month/Year | Target Facility | Country | Vector Type | Impact |
|---|---|---|---|---|
| Jan 2020 | Picanol | China, Romania, Belgium | Ransomware | No information |
| Jan 2020 | Bapco Oil | Bahrain | Wiper Attack | No severe impact. |
| April 2020 | Water treatment facilities | Isreal | Malware | SCADA devices |
| April 2020 | Government and Industrial Organisations | Azerbaijan’s | COVID-19; RAT, PoetRAT, Phishing | Many devices and word documents |
| April 2020 | Energias de Portugal | Portugal | Ragnar Locker Malware (Ransomware) | 1 T.B. of sensitive data with a demand for 10.9 million USD |
| April 2020 | DESMI | Denmark | Ransomware | Impacted a few communication systems. |
| May 2020 | Stadler | Switzerland | Ransomware | Data Theft |
| May 2020 | Elexon | UK | Ransomware | Internal Network – Electricity Outage |
| May 2020 | Bluescope | Australia | Ransomware | Manufacturing Operations |
| Jun 2020 | Honda | Japan / Europe | Malware |
Fig. 4User-centric Edge-based VPP Security
Fig. 5Device-Centric Edge Security for VPP
Fig. 6Distributed Edge Based Firewall
Fig. 7Edge Based Intrusion Detection System (EIDS)
Fig. 8Edge-based Virtual Immune System
Fig. 9Edge-Based Privacy-Preserving Model